This course not only comprises core theoretical concepts but also several interesting hands-on demonstrations that will help you build practical experience on the Amazon Web Services (AWS) platform; you will gain confidence in architecting, designing, and implementing solutions on AWS.
Explore the world of cybersecurity with our "IT Security for IT Professionals" course. Gain expertise in fundamental areas such as network security, cryptography, web security, and emerging trends. Equip yourself with the skills needed to protect against evolving cyber threats. Enroll now for a comprehensive journey into IT security and fortify your role as a vigilant IT professional.
Duration 1 Days 6 CPD hours This course is intended for This course is best suited to IT business decision-makers and individuals who are new to working with AWS Overview Skills gained in this training include:Identify the value and benefits of the AWS cloudRecognize the valuable ways that the AWS platform can be usedUnderstand the robust security capabilities, controls, and assurances in place to maintain security and data protectionArticulate the financial impact the AWS cloud can have on an organization?s procurement cycle, cost management, and contracts, while minimizing risks associated with consumption-based pricing models AWS Business Essentials helps IT business decision makers understand the benefits of cloud computing and how a cloud strategy can help you meet your business objectives. Course Outline Benefits of Cloud Computing and Defining Your Cloud Strategy Introduction to the AWS Cloud Security and Compliance Cloud Financials Migrating to the Cloud: Next Steps Additional course details: Nexus Humans AWS Business Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Business Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
This video course is designed to prepare you to achieve the internationally recognized fundamental IT training certification, CompTIA Security+ Certification SY0-601 exam. The course covers all the major domains needed for the certification and will help you develop the basics of IT and computers with the help of examples and quizzes.
Duration 5 Days 30 CPD hours This course is intended for This course is targeted toward an IT Professional that has the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. Students should have a minimum of 10 years experience including at least 5 years of hands-on technical security experience. Overview Upon successful completion of this course, students will be able to: Identify enterprise security fundamentals. Apply enterprise security technology solutions. Implement security design and solutions. Manage risk, policies and procedures within an enterprise. Integrate security solutions within an enterprise. Conduct security research and analysis. In this course, students will examine advanced security concepts, principles, and implementations that pertain to enterprise level security. Prerequisites CompTIA Cybersecurity Analyst (CySA+) Certification 1 - Enterprise Security Architecture The Basics of Enterprise Security The Enterprise Structure Enterprise Security Requirements 2 - Enterprise Security Technology Common Network Security Components and Technologies Communications and Collaboration Security Cryptographic Tools and Techniques Advanced Authentication 3 - Enterprise Resource Technology Enterprise Storage Security Issues Distributed, Shared, and Virtualized Computing Cloud Computing and Security 4 - Security Design and Solutions Network Security Design Conduct a Security Assessment Host Security 5 - Application Security Design Application Security Basics Web Application Security 6 - Managing Risk, Security Policies, and Security Procedures Analyze Security Risk Implement Risk Mitigation Strategies and Controls Implement Enterprise-Level Security Policies and Procedures Prepare for Incident Response and Recovery 7 - Enterprise Security Integration The Technology Life Cycle Inter-Organizational Change Integrate Enterprise Disciplines to Achieve Secure Solutions 8 - Security Research and Analysis Perform an Industry Trends and Impact Analysis Perform an Enterprise Security Analysis
The NCSP® 800-53 Practitioner accredited (APMG International), certified (NCSC/GCHQ-UK), and recognized (DHS-CISA-USA) certification course teaches Digital Business, Operational Stakeholders, Auditors, and Risk Practitioners a Fast-Track approach to adopting and adapting the NIST Cybersecurity Framework and its 800-53 controls across an enterprise and its supply chain.The course also teaches candidates how to build a Digital Value Management System (DVMS) CPD overlay model capable of enabling the quick adoption and adaption of new frameworks and models (NIST-CSF, NIST Privacy Framework, CMMC, etc.) that may be required to address internal, external (regulatory), and cyber threat landscape changes. Finally, the course teaches candidates how to ensure the organization's DVMS is designed for use within the organization and auditable by government regulators looking to verify regulatory outcomes. The NCSP Practitioner 800-53 course is designed for both the Implementer and Auditor topics and participants select the exam they want to take (or an additional exam can be ordered to be certified as both an implementer and auditor).
The NCSP® ISO 27001 Specialist accredited (APMG International), certified (NCSC/GCHQ-UK), and recognized (DHS-CISA-USA) certification course teaches Digital Business, Operational Stakeholders, Auditors, and Risk Practitioners a Fast-Track approach to adopting and adapting the ISO 27001 controls in the context of a NIST Cybersecurity Framework program.This course looks at the impact of adapting a principled approach to an enterprise risk management framework to better support cybersecurity decisions within the context of the selected informative reference. It guides participants on the best approach to adapt, implement, and operate (AIO) a comprehensive cybersecurity program that integrates into existing organizational capabilities and incorporates the selected Informative Reference. NCSP® ISO 27001 Specialist introduces the integration of typical enterprise capabilities with cybersecurity from the perspective of the selected cybersecurity informative reference. The overall approach places these activities into systems thinking context by introducing the Service Value Management System composed of three aspects, governance, assurance, and the Z-X Model. With this in place, the course presents the approach to adapt, implement, operate, and improve the organizational cybersecurity posture that builds on the application of the FastTrack™ presented in the NCSP Practitioner. The NIST Cybersecurity Professional (NCSP®) program is the industry's first accredited certification training program that teaches organizations how to build a Digital Value Management Overlay System capable of leveraging the NIST Cybersecurity Framework to deliver the secure, digital business outcomes expected by executives, government regulators, and legal advisors.
The NCSP® 800-171 Specialist accredited (APMG International), certified (NCSC/GCHQ-UK), and recognized (DHS-CISA-USA) certification course teaches Digital Business, Operational Stakeholders, Auditors, and Risk Practitioners a Fast-Track approach to adopting and adapting the 800-171 controls in the context of a NIST Cybersecurity Framework program. This course looks at the impact of adapting a principled approach to the enterprise risk management (ERM) framework to better support cybersecurity decisions, establishing the context for the selected informative reference (IR). It guides participants on the best approach to adapting, implementing, and operating (AIO) a comprehensive cybersecurity program that can be integrated into the existing organizational capabilities and incorporates the selected IR. NCSP® 800-171 Specialist introduces the integration of typical enterprise capabilities with cybersecurity from the selected cybersecurity IR perspective. The overall approach places these activities into a systems-thinking context by introducing the service value management system (SVMS), including governance, assurance, and the Z-X model. With this in place, the course presents the approach to adapt, implement, operate, and improve the organizational cybersecurity posture that builds on the application of the FastTrack™ concept presented in the NCSP Practitioner course. The NIST Cybersecurity Professional (NCSP®) program is the industry's first accredited certification training program that teaches organizations how to build a Digital Value Management Overlay System capable of leveraging the NIST Cybersecurity Framework to deliver the secure, digital business outcomes expected by executives, government regulators, and legal advisors.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for security engineers, security architects, and information security professionals. Overview Identify security benefits and responsibilities of using the AWS Cloud Build secure application infrastructures Protect applications and data from common security threats Perform and automate security checks Configure authentication and permissions for applications and resources Monitor AWS resources and respond to incidents Capture and process logs Create and configure automated and repeatable deployments with tools such as AMIs and AWS CloudFormation This course demonstrates how to efficiently use AWS security services to stay secure in the AWS Cloud. The course focuses on the security practices that AWS recommends for enhancing the security of your data and systems in the cloud. The course highlights the security features of AWS key services including compute, storage, networking, and database services. You will also learn how to leverage AWS services and tools for automation, continuous monitoring and logging, and responding to security incidents. Prerequisites We recommend that attendees of this course have: Working knowledge of IT security practices and infrastructure concepts Familiarity with cloud computing concepts Completed AWS Security Essentials and Architecting on AWS courses 1 - Security on AWS Security in the AWS cloud AWS Shared Responsibility Model Incident response overview DevOps with Security Engineering 2 - Identifying Entry Points on AWS Identify the different ways to access the AWS platform Understanding IAM policies IAM Permissions Boundary IAM Access Analyzer Multi-factor authentication AWS CloudTrail 3 - Security Considerations: Web Application Environments Threats in a three-tier architecture Common threats: user access Common threats: data access AWS Trusted Advisor 4 - Application Security Amazon Machine Images Amazon Inspector AWS Systems Manager 5 - Data Security Data protection strategies Encryption on AWS Protecting data at rest with Amazon S3, Amazon RDS, Amazon DynamoDB Protecting archived data with Amazon S3 Glacier Amazon S3 Access Analyzer Amazon S3 Access Points 6 - Securing Network Communications Amazon VPC security considerations Amazon VPC Traffic Mirroring Responding to compromised instances Elastic Load Balancing AWS Certificate Manager 7 - Monitoring and Collecting Logs on AWS Amazon CloudWatch and CloudWatch Logs AWS Config Amazon Macie Amazon VPC Flow Logs Amazon S3 Server Access Logs ELB Access Logs 8 - Processing Logs on AWS Amazon Kinesis Amazon Athena 9 - Security Considerations: Hybrid Environments AWS Site-to-Site and Client VPN connections AWS Direct Connect AWS Transit Gateway 10 - Out-Of-Region Protection Amazon Route 53 AWS WAF Amazon CloudFront AWS Shield AWS Firewall Manager DDoS mitigation on AWS 11 - Security Considerations: Serverless Environments Amazon Cognito Amazon API Gateway AWS Lambda 12 - Threat Detection and Investigation Amazon GuardDuty AWS Security Hub Amazon Detective 13 - Secrets Management on AWS AWS KMS AWS CloudHSM AWS Secrets Manager 14 - Automation and Security by Design AWS CloudFormation AWS Service Catalog 15 - Account Management and Provisioning on AWS AWS Organizations AWS Control Tower AWS SSO AWS Directory Service
The NCSP® Foundation accredited (APMG International), certified (NCSC/GCHQ-UK) and recognized (DHS-CISA-USA) certification course introduces business, technology, auditing, and management professionals to the fundamentals of digital business, its risks, and the NIST Cybersecurity Framework's role in helping organizations manage and mitigate digital risk. This course also introduces candidates to an Affordable, Pragmatic, and Scalable Digital Value Management System (DVMS) Create, Protect, and Deliver (CPD) model designed to enable any size organization to quickly adopt and adapt the frameworks and models (NIST-CSF, NIST Privacy Framework, CMMC, etc.) that may be required to address internal, external (regulatory) and cyber threat landscape changes. The DVMS enables enterprises to become adaptive, cyber-resilient organizations capable of creating, protecting, and delivering trusted digital business value to their stakeholders.